Sciweavers

234 search results - page 42 / 47
» Detecting Student Misuse of Intelligent Tutoring Systems
Sort
View
AIED
2005
Springer
14 years 1 months ago
On Using Learning Curves to Evaluate ITS
Measuring the efficacy of ITS can be hard because there are many confounding factors: short, well-isolated studies suffer from insufficient interaction with the system, while longe...
Brent Martin, Kenneth R. Koedinger, Antonija Mitro...
GECCO
2009
Springer
150views Optimization» more  GECCO 2009»
14 years 2 months ago
Integrating real-time analysis with the dendritic cell algorithm through segmentation
As an immune inspired algorithm, the Dendritic Cell Algorithm (DCA) has been applied to a range of problems, particularly in the area of intrusion detection. Ideally, the intrusio...
Feng Gu, Julie Greensmith, Uwe Aickelin
ITS
2004
Springer
99views Multimedia» more  ITS 2004»
14 years 1 months ago
Promoting Effective Help-Seeking Behavior Through Declarative Instruction
The ability to use help-resources efficiently is an important skill in any learning environment, whether the student is in a traditional classroom or is using an Intelligent Tutor...
Ido Roll, Vincent Aleven, Kenneth R. Koedinger
AIED
2009
Springer
14 years 2 months ago
A VR Environment for Assessing Dental Surgical Expertise
Traditional methods of dental surgical skills training and assessment are being challenged by complications such as unavailability of expert supervision and the subjective manner o...
Phattanapon Rhienmora, Peter Haddawy, Siriwan Sueb...
PST
2004
13 years 9 months ago
Supporting Privacy in E-Learning with Semantic Streams
The goal of the semantic web is to facilitate the exchange of meaningful information in a form that is easy for machines to process. The goal of an e-learning system is to support ...
Lori Kettel, Christopher A. Brooks, Jim E. Greer